Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Protecting Your Network with Authentication and Cryptography

Date:
Feb. 09, 2011
Duration:
45m 10s

In this webinar, the first of two based on our Cybersecurity Foundations course, you will examine the following topics: verifying users and what they can access, ways a user can be validated to computer and network resources, how cryptography is used to protect data, symmetric and asymmetric encryption and hashes.

Instructor:
Debbie Dahlin

Outline:

  • Identification
    • Something a user knows
    • Something a user possesses
    • Something a user is or does
  • Issues
    • Distribution
    • Cost
    • Tracking
  • Elements
  • Password Protocols
  • Hashes
  • Kerberos
  • Cryptography Benefits
    • Confidentiality
    • Encryption
    • Integrity
    • Message digests
    • Authentication
    • Public-key cryptography
    • Non-Repudiation
    • Digital signatures
  • Symmetric Encryption
  • Asymmetric Process
  • Digital Signatures
  • Certificate Authorities
  • Models
  • Lifecycle
  • Distribution